Computational Complexity Heuristic Algorithms

Total Page:16

File Type:pdf, Size:1020Kb

Computational Complexity Heuristic Algorithms Computational complexity Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Definitions: problems and instances A problem is a general question expressed in mathematical terms. Usually the same question can be expressed on many examples: they are instances of the problem. For instance: • Problem: “Is n prime?” • Instance: “Is 7 prime?” A solution S is the answer corresponding to a specific instance. Formally, a problem P is a function that maps instances from a set I into solutions (set S): P : I → S A priori, we do not know how to compute it: we need an algorithm. Definitions: algorithms An algorithm is a procedure with the following properties: • it is formally defined • it is deterministic • it made of elementary operations • it is finite. An algorithm for a problem P is an algorithm whose steps are determined by an instance I ∈ I of P and produce a solution S ∈ S A : I → S An algorithm defines a function and it also computes it. If the function is the same, the algorithm is exact; otherwise, it is heuristic. Algorithms characteristics A heuristic algorithm should be 1. effective: it should compute solutions with a value close to the optimum; 2. efficient: its computational complexity should be low, at least compared with an exact algorithm; 3. robust: it should remain effective and efficient for any possible input. To compute a solution, an algorithm needs some resources. The two most important ones are • space (amount of memory required to store data); • time (number of elementary steps to be performed to compute the final result). Complexity Time is usually considered as the most critical resource because: • time is subtracted from other computations more often than space; • it is often possible to use very large amounts of space at a very low cost, but not the same for time; • the need of space is upper bounded by the need for time, because space is re-usable. It is intuitive that in general the larger is an instance, the larger is the amount of resources that are needed to compute its solution. However how the computational cost grows when the instance size grows is not always the same: it depends on the problem and on the algorithm. By computational complexity of an algorithm we mean the speed with which the consumption of computational resources grows when the size of the instance grows. Measuring the time complexity The time needed to solve a problem depends on: • the specific instance to be solved • the algorithm used • the machine that executes the algorithm • . We want a measure of the time complexity with the following characteristics: • independent of the technology, i.e. it must be the same when the computation is done on different hardware; • synthetic and formally defined, i.e. it must be represented by a simple and well-defined mathematical expression; • ordinal, i.e. it must allow to rank the algorithms according to their complexity. The observed computing time, does not satisfy these requirements. Time complexity The asymptotic worst-case time complexity of an algorithm provides the required measure in this way: 1. we measure the number T of elementary operations executed (which is computer-independent); 2. we compute a number n which determines the number of bits needed to define the size of any instance (e.g., the number of elements in the ground set in a combinatorial optimization problem); 3. we find the maximum number of elementary operations needed to solve instances of size n T (n)= max T (I) n ∈ N I∈In (this reduces the complexity to a function T : N → N) 4. we approximate T (n) with a simpler funcion f (n), for which we are only interested in the asymptotic trend for n → +∞ (complexity is more important when instances are larger) 5. finally we can collect these functions in complexity classes. Notation: Θ T (n) ∈ Θ (f (n)) means that + ∃c1, c2 ∈ R , n0 ∈ N : c1 f (n) ≤ T (n) ≤ c2 f (n) for all n ≥ n0 where c1, c2 and n0 are constant values, independent on n. T (n) is between c1f (n) and c2f (n) T(n) c f(n) f(n) 2 • for a suitable “small value” c1 T (n) A • for a suitable “large value” c2 c f(n) • for any size larger than n0 1 n n 0 Asymptotically, f (n) is an estimate of T (n) within a constant factor: • for large instances, the computing time is proportional to f (n). Notation: O T (n) ∈ O (f (n)) means that + ∃c ∈ R , n0 ∈ N : T (n) ≤ c f (n) for all n ≥ n0 where c and n0 do not depend on n. T(n) c f(n) T (n) is upper bounded by cf (n) T (n) • for a suitable “large value” c A • for any n larger than a suitable f(n) n0 n n 0 Asymptotically, f (n) is an upper bound for T (n) within a constant factor: • for large instances the computing time is at most proportional to f (n). Notation: Ω T (n) ∈ Ω (f (n)) means that ∃c > 0, n0 ∈ N : T (n) ≥ c f (n) for all n ≥ n0 where c and n0 do not depend on n. T(n) f(n) T (n) is “lower bounded” by cf (n) T (n) • for some suitable “small value” A di c c f(n) • for any n larger than n0 n n 0 Asymptotically, f (n) is a lower bound of T (n) within a constant factor: • for large instances the computing time is at least proportional to f (n) Combinatorial optimization In combinatorial optimization problems it is natural to define the size of an instance as the cardinality of its ground set. An explicit enumeration algorithm • considers each subset S ⊆ E, • evaluates whether it is feasible (x ∈ X) in α (n) time, • evaluates the objective function f (x) in β (n) time, • records the best value found. Since the number of solutions is exponential in n, its complexity is at least exponential, even if α (n) and β (n) are polynomials (as often occurs). Polynomial and exponential complexity In combinatorial optimization, the main distinction is between • polynomial complexity: T (n) ∈ O nd for a constant d > 0 • exponential complexity: T (n) ∈ Ω (d n) for a constant d > 1 The algorithms of the former type are efficient; those of the latter type are inefficient. In general, heuristic algorithms are polynomial and they are used when the corresponding exact algorithms are exponential. Assuming 1 operation/µsec n n2 op. 2n op. 1 1µ sec 2µ sec 10 0.1 msec 1 msec 20 0.4 msec 1 sec 30 0.9 msec 17.9 min 40 1.6 msec 12.7 days 50 2.5 msec 35.7 years 60 3.6 msec 366 centuries Problem transformations and reductions Some times it is possible and convenient to reformulate an instance of a problem P into an instance of a problem Q and then to transform back the solution of the latter into a solution of the former. Polynomial transformation P Q: given any instance of P • a corresponding instance of Q is defined in polynomial time • the instance of Q is solved by a suitable algorithm, providing a solution SQ • from SQ a corresponding solution SP is obtained in polynomial time Example: VCP SCP, MCP MISP and MISP MCP. Problem transformations and reductions Polynomial reduction P Q: given any instance of P • an algorithm A is executed a polynomial number of times; • to solve instances of a problem Q obtained in polynomial time from the instance of P and from the results of the previous runs; • from the solutions computed, a solution of the instance of P is obtained. Examples: BPP PMSP and PMSP BPP. In both cases • if A is polynomial/exponential, the overall algorithm turns out to be polynomial/exponential • if A is exact/heuristic, the overall algorithm turns out to be exact/heuristic Optimization vs. decision A polynomial reduction links optimization and decision problems. • Optimization problem: given a function f and a feasible region X, what is the minimum of f in X? f ∗ = min f = ? x∈X • Decision problem: given a function f , a value k and a feasible region X, do solutions with a value not larger than k exist? ∃x ∈ X : f (x) ≤ k? The two problems are polynomially equivalent: • the decision problem can be solved by solving the optimization problem and then comparing the optimal value with k; • the optimization problem can be solved by repeatedly solving the decision problem for different values of k, tuned by dichotomous search. Drawbacks of worst-case analysis The worst-case time complexity has some relevant drawbacks: • it does not consider the performance of the algorithm on the easy/small instances; in practice the most difficult instances could be rare or unrealistic; • it provides a rough estimate of the computing time growth, not of the computing time itself; • the estimate can be very rough, up to the point it becomes useless; • it may be misleading: algorithms with worse worst-case computational complexity can be very efficient in practice, even more than algorithms with better worst-case computational complexity. Other complexity measures To overcome these drawbacks one could employ different definitions of computational complexity: • parameterized complexity expresses T as a function of some other relevant parameter k besides the size of the instance n: T (n, k) • average-case complexity assumes a probability distribution on I and it evaluates the expected value of T (I) on In T (n)= E [T (I) |I ∈ In] If the distribution has some parameter k, the average-case complexity is also parameterized, i.e.
Recommended publications
  • Computational Complexity and Intractability: an Introduction to the Theory of NP Chapter 9 2 Objectives
    1 Computational Complexity and Intractability: An Introduction to the Theory of NP Chapter 9 2 Objectives . Classify problems as tractable or intractable . Define decision problems . Define the class P . Define nondeterministic algorithms . Define the class NP . Define polynomial transformations . Define the class of NP-Complete 3 Input Size and Time Complexity . Time complexity of algorithms: . Polynomial time (efficient) vs. Exponential time (inefficient) f(n) n = 10 30 50 n 0.00001 sec 0.00003 sec 0.00005 sec n5 0.1 sec 24.3 sec 5.2 mins 2n 0.001 sec 17.9 mins 35.7 yrs 4 “Hard” and “Easy” Problems . “Easy” problems can be solved by polynomial time algorithms . Searching problem, sorting, Dijkstra’s algorithm, matrix multiplication, all pairs shortest path . “Hard” problems cannot be solved by polynomial time algorithms . 0/1 knapsack, traveling salesman . Sometimes the dividing line between “easy” and “hard” problems is a fine one. For example, . Find the shortest path in a graph from X to Y (easy) . Find the longest path (with no cycles) in a graph from X to Y (hard) 5 “Hard” and “Easy” Problems . Motivation: is it possible to efficiently solve “hard” problems? Efficiently solve means polynomial time solutions. Some problems have been proved that no efficient algorithms for them. For example, print all permutation of a number n. However, many problems we cannot prove there exists no efficient algorithms, and at the same time, we cannot find one either. 6 Traveling Salesperson Problem . No algorithm has ever been developed with a Worst-case time complexity better than exponential .
    [Show full text]
  • Algorithms and Computational Complexity: an Overview
    Algorithms and Computational Complexity: an Overview Winter 2011 Larry Ruzzo Thanks to Paul Beame, James Lee, Kevin Wayne for some slides 1 goals Design of Algorithms – a taste design methods common or important types of problems analysis of algorithms - efficiency 2 goals Complexity & intractability – a taste solving problems in principle is not enough algorithms must be efficient some problems have no efficient solution NP-complete problems important & useful class of problems whose solutions (seemingly) cannot be found efficiently 3 complexity example Cryptography (e.g. RSA, SSL in browsers) Secret: p,q prime, say 512 bits each Public: n which equals p x q, 1024 bits In principle there is an algorithm that given n will find p and q:" try all 2512 possible p’s, but an astronomical number In practice no fast algorithm known for this problem (on non-quantum computers) security of RSA depends on this fact (and research in “quantum computing” is strongly driven by the possibility of changing this) 4 algorithms versus machines Moore’s Law and the exponential improvements in hardware... Ex: sparse linear equations over 25 years 10 orders of magnitude improvement! 5 algorithms or hardware? 107 25 years G.E. / CDC 3600 progress solving CDC 6600 G.E. = Gaussian Elimination 106 sparse linear CDC 7600 Cray 1 systems 105 Cray 2 Hardware " 104 alone: 4 orders Seconds Cray 3 (Est.) 103 of magnitude 102 101 Source: Sandia, via M. Schultz! 100 1960 1970 1980 1990 6 2000 algorithms or hardware? 107 25 years G.E. / CDC 3600 CDC 6600 G.E. = Gaussian Elimination progress solving SOR = Successive OverRelaxation 106 CG = Conjugate Gradient sparse linear CDC 7600 Cray 1 systems 105 Cray 2 Hardware " 104 alone: 4 orders Seconds Cray 3 (Est.) 103 of magnitude Sparse G.E.
    [Show full text]
  • A Short History of Computational Complexity
    The Computational Complexity Column by Lance FORTNOW NEC Laboratories America 4 Independence Way, Princeton, NJ 08540, USA [email protected] http://www.neci.nj.nec.com/homepages/fortnow/beatcs Every third year the Conference on Computational Complexity is held in Europe and this summer the University of Aarhus (Denmark) will host the meeting July 7-10. More details at the conference web page http://www.computationalcomplexity.org This month we present a historical view of computational complexity written by Steve Homer and myself. This is a preliminary version of a chapter to be included in an upcoming North-Holland Handbook of the History of Mathematical Logic edited by Dirk van Dalen, John Dawson and Aki Kanamori. A Short History of Computational Complexity Lance Fortnow1 Steve Homer2 NEC Research Institute Computer Science Department 4 Independence Way Boston University Princeton, NJ 08540 111 Cummington Street Boston, MA 02215 1 Introduction It all started with a machine. In 1936, Turing developed his theoretical com- putational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40's and 50's, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960's by Hartmanis and Stearns.
    [Show full text]
  • Interactions of Computational Complexity Theory and Mathematics
    Interactions of Computational Complexity Theory and Mathematics Avi Wigderson October 22, 2017 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, whose draft is available at https://www.math.ias.edu/avi/book]. We survey some concrete interaction areas between computational complexity theory and different fields of mathematics. We hope to demonstrate here that hardly any area of modern mathematics is untouched by the computational connection (which in some cases is completely natural and in others may seem quite surprising). In my view, the breadth, depth, beauty and novelty of these connections is inspiring, and speaks to a great potential of future interactions (which indeed, are quickly expanding). We aim for variety. We give short, simple descriptions (without proofs or much technical detail) of ideas, motivations, results and connections; this will hopefully entice the reader to dig deeper. Each vignette focuses only on a single topic within a large mathematical filed. We cover the following: • Number Theory: Primality testing • Combinatorial Geometry: Point-line incidences • Operator Theory: The Kadison-Singer problem • Metric Geometry: Distortion of embeddings • Group Theory: Generation and random generation • Statistical Physics: Monte-Carlo Markov chains • Analysis and Probability: Noise stability • Lattice Theory: Short vectors • Invariant Theory: Actions on matrix tuples 1 1 introduction The Theory of Computation (ToC) lays out the mathematical foundations of computer science. I am often asked if ToC is a branch of Mathematics, or of Computer Science. The answer is easy: it is clearly both (and in fact, much more). Ever since Turing's 1936 definition of the Turing machine, we have had a formal mathematical model of computation that enables the rigorous mathematical study of computational tasks, algorithms to solve them, and the resources these require.
    [Show full text]
  • Computational Complexity: a Modern Approach
    i Computational Complexity: A Modern Approach Sanjeev Arora and Boaz Barak Princeton University http://www.cs.princeton.edu/theory/complexity/ [email protected] Not to be reproduced or distributed without the authors’ permission ii Chapter 10 Quantum Computation “Turning to quantum mechanics.... secret, secret, close the doors! we always have had a great deal of difficulty in understanding the world view that quantum mechanics represents ... It has not yet become obvious to me that there’s no real problem. I cannot define the real problem, therefore I suspect there’s no real problem, but I’m not sure there’s no real problem. So that’s why I like to investigate things.” Richard Feynman, 1964 “The only difference between a probabilistic classical world and the equations of the quantum world is that somehow or other it appears as if the probabilities would have to go negative..” Richard Feynman, in “Simulating physics with computers,” 1982 Quantum computing is a new computational model that may be physically realizable and may provide an exponential advantage over “classical” computational models such as prob- abilistic and deterministic Turing machines. In this chapter we survey the basic principles of quantum computation and some of the important algorithms in this model. One important reason to study quantum computers is that they pose a serious challenge to the strong Church-Turing thesis (see Section 1.6.3), which stipulates that every physi- cally reasonable computation device can be simulated by a Turing machine with at most polynomial slowdown. As we will see in Section 10.6, there is a polynomial-time algorithm for quantum computers to factor integers, whereas despite much effort, no such algorithm is known for deterministic or probabilistic Turing machines.
    [Show full text]
  • CS221: Algorithms and Data Structures Lecture #4 Sorting
    Today’s Outline CS221: Algorithms and • Categorizing/Comparing Sorting Algorithms Data Structures – PQSorts as examples Lecture #4 • MergeSort Sorting Things Out • QuickSort • More Comparisons Steve Wolfman • Complexity of Sorting 2014W1 1 2 Comparing our “PQSort” Categorizing Sorting Algorithms Algorithms • Computational complexity • Computational complexity – Average case behaviour: Why do we care? – Selection Sort: Always makes n passes with a – Worst/best case behaviour: Why do we care? How “triangular” shape. Best/worst/average case (n2) often do we re-sort sorted, reverse sorted, or “almost” – Insertion Sort: Always makes n passes, but if we’re sorted (k swaps from sorted where k << n) lists? lucky and search for the maximum from the right, only • Stability: What happens to elements with identical keys? constant work is needed on each pass. Best case (n); worst/average case: (n2) How much extra memory is used? • Memory Usage: – Heap Sort: Always makes n passes needing O(lg n) on each pass. Best/worst/average case: (n lg n). Note: best cases assume distinct elements. 3 With identical elements, Heap Sort can get (n) performance.4 Comparing our “PQSort” Insertion Sort Best Case Algorithms 0 1 2 3 4 5 6 7 8 9 10 11 12 13 • Stability 1 2 3 4 5 6 7 8 9 10 11 12 13 14 – Selection: Easily made stable (when building from the PQ left, prefer the left-most of identical “biggest” keys). 1 2 3 4 5 6 7 8 9 10 11 12 13 14 – Insertion: Easily made stable (when building from the left, find the rightmost slot for a new element).
    [Show full text]
  • Quantum Computational Complexity Theory Is to Un- Derstand the Implications of Quantum Physics to Computational Complexity Theory
    Quantum Computational Complexity John Watrous Institute for Quantum Computing and School of Computer Science University of Waterloo, Waterloo, Ontario, Canada. Article outline I. Definition of the subject and its importance II. Introduction III. The quantum circuit model IV. Polynomial-time quantum computations V. Quantum proofs VI. Quantum interactive proof systems VII. Other selected notions in quantum complexity VIII. Future directions IX. References Glossary Quantum circuit. A quantum circuit is an acyclic network of quantum gates connected by wires: the gates represent quantum operations and the wires represent the qubits on which these operations are performed. The quantum circuit model is the most commonly studied model of quantum computation. Quantum complexity class. A quantum complexity class is a collection of computational problems that are solvable by a cho- sen quantum computational model that obeys certain resource constraints. For example, BQP is the quantum complexity class of all decision problems that can be solved in polynomial time by a arXiv:0804.3401v1 [quant-ph] 21 Apr 2008 quantum computer. Quantum proof. A quantum proof is a quantum state that plays the role of a witness or certificate to a quan- tum computer that runs a verification procedure. The quantum complexity class QMA is defined by this notion: it includes all decision problems whose yes-instances are efficiently verifiable by means of quantum proofs. Quantum interactive proof system. A quantum interactive proof system is an interaction between a verifier and one or more provers, involving the processing and exchange of quantum information, whereby the provers attempt to convince the verifier of the answer to some computational problem.
    [Show full text]
  • Computational Complexity
    Computational Complexity The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Vadhan, Salil P. 2011. Computational complexity. In Encyclopedia of Cryptography and Security, second edition, ed. Henk C.A. van Tilborg and Sushil Jajodia. New York: Springer. Published Version http://refworks.springer.com/mrw/index.php?id=2703 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33907951 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP Computational Complexity Salil Vadhan School of Engineering & Applied Sciences Harvard University Synonyms Complexity theory Related concepts and keywords Exponential time; O-notation; One-way function; Polynomial time; Security (Computational, Unconditional); Sub-exponential time; Definition Computational complexity theory is the study of the minimal resources needed to solve computational problems. In particular, it aims to distinguish be- tween those problems that possess efficient algorithms (the \easy" problems) and those that are inherently intractable (the \hard" problems). Thus com- putational complexity provides a foundation for most of modern cryptogra- phy, where the aim is to design cryptosystems that are \easy to use" but \hard to break". (See security (computational, unconditional).) Theory Running Time. The most basic resource studied in computational com- plexity is running time | the number of basic \steps" taken by an algorithm. (Other resources, such as space (i.e., memory usage), are also studied, but they will not be discussed them here.) To make this precise, one needs to fix a model of computation (such as the Turing machine), but here it suffices to informally think of it as the number of \bit operations" when the input is given as a string of 0's and 1's.
    [Show full text]
  • Foundations of Quantum Computing and Complexity
    Foundations of quantum computing and complexity Richard Jozsa DAMTP University of CamBridge Why quantum computing? - physics and computation A key question: what is computation.. ..fundamentally? What makes it work? What determines its limitations?... Information storage bits 0,1 -- not abstract Boolean values but two distinguishable states of a physical system Information processing: updating information A physical evolution of the information-carrying physical system Hence (Deutsch 1985): Possibilities and limitations of information storage / processing / communication must all depend on the Laws of Physics and cannot be determined from mathematics alone! Conventional computation (bits / Boolean operations etc.) based on structures from classical physics. But classical physics has been superseded by quantum physics … Current very high interest in Quantum Computing “Quantum supremacy” expectation of imminent availability of a QC device that can perform some (albeit maybe not at all useful..) computational tasK beyond the capability of all currently existing classical computers. More generally: many other applications of quantum computing and quantum information ideas: Novel possibilities for information security (quantum cryptography), communication (teleportation, quantum channels), ultra-high precision sensing, etc; and with larger QC devices: “useful” computational tasKs (quantum algorithms offering significant benefits over possibilities of classical computing) such as: Factoring and discrete logs evaluation; Simulation of quantum systems: design of large molecules (quantum chemistry) for new nano-materials, drugs etc. Some Kinds of optimisation tasKs (semi-definite programming etc), search problems. Currently: we’re on the cusp of a “quantum revolution in technology”. Novel quantum effects for computation and complexity Quantum entanglement; Superposition/interference; Quantum measurement. Quantum processes cannot compute anything that’s not computable classically.
    [Show full text]
  • On the Computational Complexity of Algorithms by J
    ON THE COMPUTATIONAL COMPLEXITY OF ALGORITHMS BY J. HARTMANIS AND R. E. STEARNS I. Introduction. In his celebrated paper [1], A. M. Turing investigated the computability of sequences (functions) by mechanical procedures and showed that the setofsequencescanbe partitioned into computable and noncomputable sequences. One finds, however, that some computable sequences are very easy to compute whereas other computable sequences seem to have an inherent complexity that makes them difficult to compute. In this paper, we investigate a scheme of classifying sequences according to how hard they are to compute. This scheme puts a rich structure on the computable sequences and a variety of theorems are established. Furthermore, this scheme can be generalized to classify numbers, functions, or recognition problems according to their compu- tational complexity. The computational complexity of a sequence is to be measured by how fast a multitape Turing machine can print out the terms of the sequence. This particular abstract model of a computing device is chosen because much of the work in this area is stimulated by the rapidly growing importance of computation through the use of digital computers, and all digital computers in a slightly idealized form belong to the class of multitape Turing machines. More specifically, if Tin) is a computable, monotone increasing function of positive integers into positive integers and if a is a (binary) sequence, then we say that a is in complexity class ST or that a is T-computable if and only if there is a multitape Turing machine 3~ such that 3~ computes the nth term of a. within Tin) operations.
    [Show full text]
  • A Machine-Checked Proof of the Average-Case Complexity of Quicksort in Coq
    A Machine-checked Proof of the Average-case Complexity of Quicksort in Coq Eelis van der Weegen? and James McKinna [email protected], [email protected] Institute for Computing and Information Sciences Radboud University Nijmegen Heijendaalseweg 135, 6525 AJ Nijmegen, The Netherlands Abstract. As a case-study in machine-checked reasoning about the complexity of algorithms in type theory, we describe a proof of the average-case complexity of Quicksort in Coq. The proof attempts to fol- low a textbook development, at the heart of which lies a technical lemma about the behaviour of the algorithm for which the original proof only gives an intuitive justification. We introduce a general framework for algorithmic complexity in type the- ory, combining some existing and novel techniques: algorithms are given a shallow embedding as monadically expressed functional programs; we introduce a variety of operation-counting monads to capture worst- and average-case complexity of deterministic and nondeterministic programs, including the generalization to count in an arbitrary monoid; and we give a small theory of expectation for such non-deterministic computations, featuring both general map-fusion like results, and specific counting ar- guments for computing bounds. Our formalization of the average-case complexity of Quicksort includes a fully formal treatment of the `tricky' textbook lemma, exploiting the generality of our monadic framework to support a key step in the proof, where the expected comparison count is translated into the expected length of a recorded list of all comparisons. 1 Introduction Proofs of the O(n log n) average-case complexity of Quicksort [1] are included in many textbooks on computational complexity [9, for example].
    [Show full text]
  • On the Computational Complexity of Mathematical Functions
    On the computational complexity of mathematical functions Jean-Pierre Demailly Institut Fourier, Universit´ede Grenoble I & Acad´emie des Sciences, Paris (France) November 26, 2011 KVPY conference at Vijyoshi Camp Jean-Pierre Demailly (Grenoble I), November 26, 2011 On the computational complexity of mathematical functions Computing, a very old concern Babylonian mathematical tablet allowing the computation of √2 (1800 – 1600 BC) Decimal numeral system invented in India ( 500BC ?) : ∼ Jean-Pierre Demailly (Grenoble I), November 26, 2011 On the computational complexity of mathematical functions Madhava’s formula for π Early calculations of π were done by Greek and Indian mathematicians several centuries BC. These early evaluations used polygon approximations and Pythagoras theorem. In this way, using 96 sides, Archimedes got 10 10 3+ 71 <π< 3+ 70 whose average is 3.1418 (c. 230 BC). Chinese mathematicians reached 7 decimal places in 480 AD. The next progress was the discovery of the first infinite series formula by Madhava (circa 1350 – 1450), a prominent mathematician-astronomer from Kerala (formula rediscovered in the XVIIe century by Leibniz and Gregory) : π 1 1 1 1 1 ( 1)n = 1 + + + + − + 4 − 3 5 − 7 9 − 11 · · · 2n + 1 · · · Convergence is unfortunately very slow, but Madhava was able to improve convergence and reached in this way 11 decimal places. Jean-Pierre Demailly (Grenoble I), November 26, 2011 On the computational complexity of mathematical functions Ramanujan’s formula for π Srinivasa Ramanujan (1887 – 1920), a self-taught mathematical prodigee. His work dealt mainly with arithmetics and function theory +∞ 1 2√2 (4n)!(1103 + 26390n) = (1910). π 9801 (n!)43964n Xn=0 Each term is approximately 108 times smaller than the preceding one, so the convergence is very fast.
    [Show full text]